CVE-2022-4361

Severity
6.1MEDIUM
EPSS
1.3%
top 20.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 7
Latest updateAug 25

Description

Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0

Affected Packages3 packages

NVDredhat/keycloak< 21.1.2
NVDredhat/single_sign-on7.67.6.4

Also affects: Openshift Container Platform 4.11, 4.12, 4.10, 4.9

Patches

🔴Vulnerability Details

3
CVEList
CVE-2022-4361: Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers2023-07-07
OSV
Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC2023-06-30
GHSA
Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC2023-06-30

📋Vendor Advisories

2
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-43612023-08-25
Red Hat
RHSSO: XSS due to lax URI scheme validation2023-06-27